safe

Results 251 - 275 of 947Sort Results By: Published Date | Title | Company Name
Published By: SafeNet     Published Date: Jun 04, 2013
This paper uncovers the key strategies that banks can employ in order to effectively and efficiently combat today's threats, and ensure identity and transaction security in eBanking.
Tags : 
ebanking, identity protection, transaction protection, authentication
    
SafeNet
Published By: Panaya     Published Date: May 17, 2017
Avoid the top counterproductive UAT practices and gain user adoption. Read the eBook to simplify UAT and execute testing cycles faster and safer.
Tags : 
acceptance testing, uat testing, user acceptance testing, uat environment
    
Panaya
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: • Advanced traffic steering from failover to GSLB capabilities • Rapid record propagation time • Secondary DNS support • Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS has recently been dubbed by Gartner Research as “mission-critical” infrastructure and as such, who you select for a DNS provider can have a significant impact on the functionality and performance of your online assets. To help with your research, download this DNS evaluation guide. You will learn the most important functions of a robust DNS provider including: Advanced traffic steering from failover to GSLB capabilities Rapid record propagation time Secondary DNS support Security expertise Keep your brand safe and your user-experience top notch by choosing the best provider for your business. Learn more now!
Tags : 
    
Oracle + Dyn
Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security
    
VMware
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this eBook you’ll read case studies about top enterprises that have safely enabled BYOD and self-service capabilities with an EMM platform, providing IT with an opportunity to enable process transformations and drive new revenue streams.
Tags : 
byod, emm, mobility, airwatch, enterprise applications, platforms, business technology
    
VMware AirWatch
Published By: Riskified     Published Date: Aug 06, 2019
This report addresses the challenges fashion retailers face as they try to secure long-term online revenue growth in a highly competitive business environment. It explores ways for meeting customers’ increasingly sophisticated expectations, including how to optimize the eCommerce shopping journey and safely expand across channels and borders. Inside you’ll find insights on:
Tags : 
    
Riskified
Published By: Kronos     Published Date: Sep 24, 2018
While there are many factors that contribute to workforce engagement, you can start by focusing on top employee needs that contribute to a positive work environment including Safety, Flexibility, Fair treatment and the opportunity to make an impact.
Tags : 
    
Kronos
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
    
Intel Security
Published By: Motorola Solutions     Published Date: Aug 14, 2019
n hospitality, communication is the key to customer satisfaction, helping businesses create the ideal guest experience while driving efficiencies that save valuable time and resources. In the quest to craft a better, safer experience, for both guests and employees, digital communication is playing an increasingly important role. As communications technology continues to reshape the hospitality landscape, questions remain for businesses striving to achieve the best customer experience possible.
Tags : 
    
Motorola Solutions
Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery. Learn how to recover faster, reduce risk, and save money.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations
    
Riverbed Technology, Inc.
Published By: Riverbed     Published Date: Mar 23, 2015
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to disaster recovery. It can take days to restore branch operations. Branch converged infrastructure delivers local performance, stores data safely in the datacenter, and enables instant recovery.
Tags : 
    
Riverbed
Published By: Group M_IBM Q119     Published Date: Feb 15, 2019
With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q119
Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
Published By: Here Technologies     Published Date: Apr 01, 2019
Many on-demand companies are starting to rely on fast, accurate and robust mapping and location technologies in order to stay competitive and to provide superior end-user experience. Leveraging location data can assist you in accurately locating each delivery address, matching demand with available supply and exceeding your customer’s expectations. Discover a variety of ways in which on-demand transportation can be optimized by maps and location services such as those created by HERE. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to improve transportation efficiency and safety.
Tags : 
location data, transport & logistics, location services
    
Here Technologies
Published By: CDW     Published Date: Jul 08, 2015
Keep data safe, even as it moves outside the perimeter of the traditional network.
Tags : 
security, vulnerability management, analytics, threat prevention, mobile security, encryption
    
CDW
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
Many law firms have begun to look to data encryption to safeguard their communications and corporate assets from unauthorized access. Learn the benefits of Encryption technology through this eBook.
Tags : 
data encryption, legal service
    
WinMagic Inc.
Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Symantec     Published Date: Jul 11, 2017
CloudSOC can help you more easily determine which apps should be blocked and which should be allowed within your organization by assisting in identifying unsanctioned Shadow IT, providing customized Business Readiness Ratings™ for each cloud app tailored to your organization’s risk profile, and applying User Behavior Analytics (UBA) to identify hackers and malicious usage. Here you’ll learn how to guide your organization through the process of safely adopting cloud apps and services using Symantec CloudSOC.
Tags : 
cloud application, cloud app adoption, cloud security, cloud protection, shadow it
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee